Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Information Security Agreement
"Need an Information Security Agreement for a Singapore-based fintech startup engaging a cloud service provider to handle customer financial data, with strict requirements around data encryption and breach notification within 24 hours."
1. Parties: Identification of all parties to the agreement, including their registered addresses and company details
2. Background: Context of the agreement and the purpose for which it is being entered into
3. Definitions: Key terms used throughout the agreement, including technical and security-related terminology
4. Scope of Information Protection: Definition of confidential information and protected data covered by the agreement
5. Security Requirements: Specific security measures and controls required to protect the information
6. Data Protection Obligations: Obligations under PDPA and other applicable laws regarding data handling
7. Breach Notification: Procedures for reporting and handling security incidents
8. Term and Termination: Duration of the agreement and conditions for termination
1. Cross-Border Data Transfers: Requirements for international data transfers when data will be transferred outside Singapore
2. Industry-Specific Requirements: Additional security requirements for specific sectors when dealing with regulated industries (finance, healthcare, etc.)
3. Audit Rights: Rights to audit security measures and compliance when regular security assessments are required
4. Subcontractor Requirements: Security obligations for third-party processors when subcontractors will handle protected information
1. Security Controls Schedule: Detailed technical and organizational security measures required
2. Data Processing Schedule: Specific details about data types, processing activities, and purposes
3. Incident Response Plan: Detailed procedures for handling security incidents
4. Compliance Checklist: List of specific security requirements and compliance measures
5. Contact Details Schedule: Key contacts for security incidents and operational matters
Authors
Personal Data
Sensitive Personal Data
Security Breach
Security Incident
Security Measures
Data Controller
Data Processor
Authorized Personnel
Access Controls
Data Protection Laws
PDPA
Processing
Security Standards
Technical Measures
Organizational Measures
Information Assets
Information Systems
Breach Notification
Data Subject
Encryption
Business Day
Intellectual Property Rights
Representatives
Subprocessor
Third Party
Force Majeure Event
Compliance Requirements
Audit
Security Documentation
Disaster Recovery Plan
Business Continuity Plan
Access Credentials
Protected Information
Security Protocols
Data Protection
Security Requirements
Access Control
Breach Notification
Incident Response
Audit Rights
Compliance
Training Requirements
Personnel Security
Physical Security
Technical Security
Data Storage
Data Transfer
Disaster Recovery
Business Continuity
Subcontracting
Liability
Indemnification
Insurance
Term and Termination
Survival
Force Majeure
Assignment
Change Control
Dispute Resolution
Governing Law
Notices
Entire Agreement
Severability
Third Party Rights
Data Retention
Return or Destruction of Data
Security Testing
Monitoring and Reporting
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.